CyberPower, CyberWar, and Other Ghosts of Cybers Past
Juan Andres Guerrero-Saade
Die, PGP, die
Will Woodruff
In German, the name of this presentation means “The, PGP, the.” With sincere apoologies to Phil Zimmerman we’re 86.9% sure Will means the other thing, though.
Hackers got 99 problems and Threat Intel ain’t one
Ian Roos
If you’re having EDR problems I feel bad for you son
I got ninety-nine problems but a TIP ain’t one
– The Hacker known as Jay Z
Introduction to ATM Penetration Testing
Hector Cuevas Cruz
ATM attacks will not stop anytime soon. They are an attractive target for cyber criminals, and financial institutions need skilled pen testers to test their ATM security. Nevertheless, few have the experience due to the lack of information. This presentation aims to be an introduction to ATM penetration testing, which can help guide security consultants into how to effectively perform an assessment. As attractive as it sounds, a financial institution doesn’t get much value from jackpotting their ATMs. There is a wide variety of variables that come into play that a pen tester should review.
It’s Harri!
Harri Hursti
One of Summercon’s favorite experts on voting fraud returns to tell us, no doubt, that the most secure election in our lifetime was, in fact, very secure. And hopefully that everything is going to be okay and that armed mobs of people aren not going to overturn your next election. But since this is a placeholder for the actual presentation abstract anything could happen when Harri hits the stage. Don’t miss it!
Just don’t fuck up: Cybersecurity lessons from engineering disasters
Arya
A chemical spill in Kansas. A plutonium accident in the USSR. Mechanical failures, human errors, tragedies. Traditional engineering–mechanical, civil, industrial–has been dealing with risk for far longer than we have. And over there, the stakes are high. The cost of a mistake can be devastating. Over decades, the industry has matured and processes have standardized. Risk reduction is now a highly formalized (and regulated) affair. There are lessons we can learn, and approaches we can use.
In this talk, we’re going to go over real engineering disasters. We’ll talk details: what went wrong, and how, and what we have learned. We will then adapt these lessons to cybersecurity and see how industrial hazard reduction concepts apply to actual security incidents.
Content note: this talk will cover actual, real engineering disasters. In some of these cases, people have died, or been seriously injured. There won’t be any graphic images–but there will be details, and some of this content may be distressing.
Lamboozling Attacker
Kelly Shortridge and Ryan Petrich
M.e.o.w. (Memory Execution Override With ebpf)
Grant Seltzer Richman
Mitre Engage
Dr. Stanley J. Barr
A Multi-model Analysis of Geopolitical Futures and its implications for the 5th domain
Constantine Nicolaidis
OFRAK Me? OFRAK You!
Dr. Ang Cui & Wyatt Ford
We are proud to present OFRAK (Open Firmware Reverse Analysis Konsole), which we will be open sourcing in August 2022!
During this talk, we will recap the OFRAK origin story, provide a sneak peek tour of the OFRAK APIs, and demonstrate how it can be used to unpack, modify, and repack firmware binaries, both interactively and programmatically at scale.
OFRAK is a software tool that combines the ability to unpack, analyze, modify, and repack binaries & firmware in a single application.
OFRAK equips users with:
- A Graphical User Interface (GUI) for interactive exploration and visualization of firmware images.
- A fully-fledged Python API, which allows users to write readable and reproducible scripts that can then be applied to entire classes of binaries, rather than only one.
- Automatic and recursive identification, unpacking and repacking of many file formats, from ELF executables to filesystem archives, with support for many compression algorithms.
Built-in integration with powerful analysis backends(Angr, Binary Ninja, Ghidra, oh my!) tools to programmatically patch executables.
Reversing an M32C firmware – Lesson learned from playing with an uncommon architecture
Philippe Laulheret
Virtual Memory Attacks
Phillip Tennen
Memory paging is a foundational technology in modern computing environments, and a thorough understanding is a critical tool in any exploit developer’s toolkit. In this talk, we’ll explore paging from the ground up, building an awareness of the abundance of OS-level technologies that are enabled by paging. This understanding will serve us while covering approaches to exploitation, as well as while covering notable security attacks both relying on paging tricks and exploiting them. We’ll examine paging’s role both in advanced security features such as ASLR and authenticated pointers, as well as how paging infrastructure and its guarantees can be abused or circumvented by an attacker to gain remote code execution. We will also demonstrate several novel attacks on-stage, with an approachable explanation of exactly how we’re managing to carry out these attacks.